Oracle to issue 88 security patches

The patch batch is even larger than the last one

Oracle is planning to release 88 patches on Tuesday, covering vulnerabilities affecting a wide array of its products, according to a pre-release announcement posted to its website on Thursday.

Tuesday's scheduled patch release is larger than Oracle's last quarterly critical patch update in January, when it released 78 fixes.

The upcoming patch batch includes six fixes for Oracle's database, three of which can be exploited remotely without a username and password. The highest CVSS (Common Vulnerability Scoring System) base score for the database bugs is 9.0 on the system's 10-point scale.

Another 11 patches cover Oracle Fusion Middleware, with nine being remotely exploitable without authentication. Within this group, the highest CVSS base score is 10 for Oracle JRockit. Other affected products include BI Publisher and JDeveloper.

The patch release also includes six bug-fixes for Oracle Enterprise Manager Grid Control; four for the E-Business Suite ERP (enterprise resource planning) application; five for Oracle's Supply Chain Suite; 15 for various PeopleSoft Enterprise applications; 17 for Oracle Financial Services software; two for Oracle Industry Applications; and one for Oracle Primavera.

Another 15 cover Oracle Sun products, including the GlassFish application server and the Solaris OS. Oracle is also set to ship six patches for the MySQL database.

"Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply Critical Patch Update fixes as soon as possible," the company said on its website.

Oracle releases bug-fixes for the Java SE programming language on a separate quarterly schedule than its packaged products. The next update for Java SE is set for June.

Chris Kanaracus covers enterprise software and general technology breaking news for The IDG News Service. Chris's e-mail address is Chris_Kanaracus@idg.com

What’s wrong? The new clean desk test
Join the discussion
Be the first to comment on this article. Our Commenting Policies